Hacking Techniques Assessment-Updated
Hacking Techniques Assessment-Updated
Techniques) assessment- 90 %
Deadline: 14/01/2021 3pm
Learning Outcomes
Employ advanced hacking techniques to compromise computer systems and networks
Review and evaluate advanced reconnaissance and scanning techniques used by Attackers
Critically analyse techniques used by attackers to gain and maintain access to computer
systems and cover tracks of the attack
INSTRUCTIONS
For this task you are required to download and set up with Vmware Player or any other Vmware
product, the Metasploitable Virtual Machine from:
http://sourceforge.net/projects/metasploitable/files/Metasploitable2/
If you do not have Vmware or do not want to use VMWare you can surely use VirtualBox or any
other virtualization software but you will have to adapt the above virtual machine to the target
virtualization environment. Easy howto instructions exist for using Vmware virtual machines in
VirtualBox. It is assumed that you have the necessary competences for carrying out the Virtual
Machine setup instructions above. There exist a number of online tutorial and instructions on how to
perform the exploitation of the Metasploitable virtual machine.
1. With regards to the Metasploitable vulnerable machine, you are to demonstrate your ability
to carry out advanced exploitation techniques by creating a penetration testing
methodology. Specifically, you are required to perform and report on the following (2000
words):
Design of a methodology
Vulnerability Scanning
Vulnerability Exploitation
Privilege escalation
Design of a methodology
should be presented,
Incident Handling and Hacking Techniques Part 1 (Hacking
Techniques) assessment- 90 %
Deadline: 14/01/2021 3pm
with sufficient detail so that a technical reader can
attempts to do.
Vulnerability Scanning
Vulnerability Exploitation
2. Please choose one of the 5 vulnerabilities that you have found in Metasploitable and explain
in detail about possible solutions to address your chosen vulnerability in 1500 words. You
can either explain your own solution or you can explain recent solutions provided by cyber
experts. (75 Marks)